ID

VAR-202307-1597


CVE

CVE-2023-37758


TITLE

D-Link Systems, Inc.  of  DIR-815  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-023370

DESCRIPTION

D-LINK DIR-815 v1.01 was discovered to contain a buffer overflow via the component /web/captcha.cgi. D-Link Systems, Inc. of DIR-815 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-37758 // JVNDB: JVNDB-2023-023370 // VULMON: CVE-2023-37758

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-815scope:eqversion:1.0.1

Trust: 1.0

vendor:d linkmodel:dir-815scope:eqversion:dir-815 firmware 1.0.1

Trust: 0.8

vendor:d linkmodel:dir-815scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-815scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-023370 // NVD: CVE-2023-37758

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-37758
value: HIGH

Trust: 1.0

NVD: CVE-2023-37758
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202307-1562
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-37758
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-37758
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-023370 // CNNVD: CNNVD-202307-1562 // NVD: CVE-2023-37758

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-023370 // NVD: CVE-2023-37758

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202307-1562

EXTERNAL IDS

db:NVDid:CVE-2023-37758

Trust: 3.3

db:JVNDBid:JVNDB-2023-023370

Trust: 0.8

db:CNNVDid:CNNVD-202307-1562

Trust: 0.6

db:VULMONid:CVE-2023-37758

Trust: 0.1

sources: VULMON: CVE-2023-37758 // JVNDB: JVNDB-2023-023370 // CNNVD: CNNVD-202307-1562 // NVD: CVE-2023-37758

REFERENCES

url:https://www.dlink.com/en/security-bulletin/

Trust: 2.5

url:https://support.dlink.ca/productinfo.aspx?m=dir-815

Trust: 2.5

url:https://hackmd.io/%40psgs7xsns5a4k7y0yib43g/rjr8onn_n

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-37758

Trust: 0.8

url:https://hackmd.io/@psgs7xsns5a4k7y0yib43g/rjr8onn_n

Trust: 0.7

url:https://cxsecurity.com/cveshow/cve-2023-37758/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-37758 // JVNDB: JVNDB-2023-023370 // CNNVD: CNNVD-202307-1562 // NVD: CVE-2023-37758

SOURCES

db:VULMONid:CVE-2023-37758
db:JVNDBid:JVNDB-2023-023370
db:CNNVDid:CNNVD-202307-1562
db:NVDid:CVE-2023-37758

LAST UPDATE DATE

2024-08-14T15:00:12.943000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-37758date:2023-07-18T00:00:00
db:JVNDBid:JVNDB-2023-023370date:2024-01-26T05:36:00
db:CNNVDid:CNNVD-202307-1562date:2023-07-24T00:00:00
db:NVDid:CVE-2023-37758date:2023-11-07T04:17:06.350

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-37758date:2023-07-18T00:00:00
db:JVNDBid:JVNDB-2023-023370date:2024-01-26T00:00:00
db:CNNVDid:CNNVD-202307-1562date:2023-07-18T00:00:00
db:NVDid:CVE-2023-37758date:2023-07-18T19:15:10.007